1
Opportunistic Power Scheduling for Dynamic Multi-server Wireless Systems Jang-Won Lee, Ravi R. Mazumdar, and Ness B. Shroff
Abstract In this paper, we present an opportunistic power scheduling scheme, i.e., a joint time-slot and power allocation scheme for downlink communication in wireless systems. Unlike past works, we allow multiple transmissions in a time-slot that could potentially interfere with each other. These multiple transmissions are allowed to achieve high system efficiency. Hence, it is important to not only select the mobiles to be scheduled in a time-slot, but also to allocate an appropriate transmission power level to these scheduled mobiles. We model the time-varying wireless channel as a stochastic process and formulate a stochastic optimization problem that attempts to maximize the expected total system utility with general constraints on performance or fairness. The power scheduling algorithm is obtained by using stochastic duality and implemented via stochastic subgradient techniques.
I. I NTRODUCTION The continued increase in demand for wireless services as well as the scarcity of radio resources makes it imperative to efficiently utilize network resources. A unique characteristic of wireless systems is that, due to fading and mobility, the wireless channel is time-varying and location-dependent. J.-W. Lee is with the Department of Electrical Engineering, Princeton University, Princeton, NJ 08544, USA (email:
[email protected]). R. R. Mazumdar is with Department of Electrical and Computer Engineering, University of Waterloo, 200 University Ave. West Waterloo, ON N2L 3G1 Canada (email:
[email protected]). N. B. Shroff is with the School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN 47907, USA (email:
[email protected]). The research was conducted when J.-W. Lee and R. R. Mazumdar were at Purdue University. This research has been supported in part by NSF grants ANI-0073359, ANI-9805441, and ANI-0207728.
2
Although at first this appears to be a drawback, the variations in the channel condition can be exploited to improve network performance [1], [2], [3]. It is well known that the system throughput can be increased by giving a higher transmission priority to a mobile that is experiencing a better channel condition (e.g., a mobile that is closer to a base-station). However, as pointed out in [1], [2], [3], this naive strategy could result in a highly unfair resource allocation, thus potentially violating the performance or Quality of Service (QoS) requirements of some mobiles. Hence, one has to carefully consider the trade-off between system efficiency and fairness among mobiles when scheduling mobiles in wireless networks. Recently, various “opportunistic” scheduling schemes have been developed for wireless networks (see [1], [2], [3], [4], [5], [6], [7], [8] and references therein). These schemes exploit the characteristics of the changing wireless channel and at the same time provide certain fairness or performance guarantees. We can classify these scheduling schemes as being either “single-server” scheduling or “multi-server” scheduling based on the underlying multiple access scheme used. In “single-server” scheduling, only one mobile is served at a time (e.g., a Time Division Multiple Access (TDMA) type of the multiple access scheme is used). For this class of scheduling schemes, a fixed power level is allocated to the scheduled mobile in the current time-slot. Hence, one only has to consider time-slot allocation without taking into account power allocation among mobiles. In contrast to “single-server” scheduling, in “multi-server” scheduling, multiple mobiles can be served simultaneously (e.g., a Code Division Multiple Access (CDMA) type of the multiple access scheme is used to allow simultaneous user transmissions). For this class of scheduling schemes, the transmission power of simultaneously scheduled mobiles could, in general, interfere with each other. Hence, one must also consider the problem of allocating power as well as choosing appropriate mobiles for transmission in the timeslot. Since the procedure to choose the candidate mobiles for transmission in a time-slot is equivalent to allocating zero power to unscheduled mobiles and positive power to the scheduled mobiles in the corresponding time-slot, we simply call this joint time-slot and power allocation power scheduling. “Multi-server” transmission (e.g., CDMA) is adopted as a multiple-access scheme in third generation systems [9] and continues to be a strong candidate for future generation systems. Further, as
3
shown in [10] and [11], except when all mobiles require very high data rates or experience poor channel conditions, we can improve system efficiency by simultaneously transmitting to multiple mobiles. The optimal number of these mobiles depends on the dynamic system environment. This implies that single-server scheduling can be inefficient because its selection is static in the sense of choosing only one mobile to be scheduled in a given time-slot. In contrast, in this paper, we will study the opportunistic scheduling problem for “dynamic multi-server” systems, where the number of mobiles selected for transmission can vary depending on the dynamic system characteristics. Our work has similarity to works in [1], [2], [3], [4], [5], [6] in the sense that they model the channel condition as a stochastic process and develop appropriate scheduling strategies. However, in [1], [2], [3], [4], “single-server” scheduling problems are studied. Hence, only mobile selection problems are considered (i.e., which mobiles should be scheduled to transmit in a given time-slot) without considering what power should be allocated to each mobile while in our problem, we must decide which and how many mobiles should be scheduled and what power level should be allocated to each of the scheduled mobiles in a given tim-slot. In [5], static “multi-server” scheduling, in which the number of scheduled mobiles is fixed in each time-slot is studied. Moreover, since mobiles that are selected for transmission are assumed to communicate using independent interfaces with each other, only a mobile selection problem is considered. In [6], a scheduling problem that attempts to maximize the total expected throughput with constraints on fairness and maximum total transmission power is studied. Since multiple mobiles can be scheduled in a time-slot and the total transmission power is limited, both mobile selection and power allocation are considered. However, in [6], each link is assumed to be orthogonal and not to interfere with each other. Further, it is assumed that there is a linear relationship between the scheduled rate and the power consumed. These assumptions are not required in our work. Moreover, in [6], only utility based fairness is considered for scheduling, while, in our work, more general types of constraints (e.g., minimum performance, utility based fairness, and resource based fairness) can be easily accommodated. The paper is organized as follows. In Section II, we introduce the system model. In Section III, we present our scheduling algorithm with general fairness or performance constraints and in Section IV,
4
we provide some examples for the constraints. In Section V, we discuss non-convexity issues. We provide numerical results in Section VI and conclude in Section VII.
II. S YSTEM M ODEL We focus on the downlink of a cell that consists of a single base-station and M mobiles. We assume that the wireless system is time-slotted. A time-slot in our system is an arbitrary interval of time and could consist of one packet or several packets. In each time-slot, mobiles are selected for transmission and the transmission power for each selected mobile is determined. The base-station has a maximum transmission power limit, PT . In wireless systems, the channel condition of each mobile (i.e., interference, background noise, and path gain) is time-varying and can be modeled as a stochastic process. We allow the channel condition to vary across time-slots and model it as a stationary stochastic process. In a time-slot, the system is assumed to be in one of several possible states, in which each state represents one of several possible levels of channel conditions for all mobiles. Each state takes a value from a finite set {1, 2, · · · , S}1 . We denote the probability that the system is in state s as πs . We first define the “generic” signal quality for mobile i when the system is in state s as γs,i (P¯s ) =
Ni Gs,i Ps,i , θGs,i ( j=1 Ps,j − Ps,i ) + Is,i PM
(1)
where P¯s :
power allocation vector for all mobiles when the system is in state s.
Ps,i :
power allocation for mobile i when the system is in state s.
Ni :
a constant for mobile i.
Gs,i : path gain from the base-station to mobile i when the system is in state s.
1
Is,i :
background noise and intercell interference at mobile i when the system is in state s.
θ:
orthogonality factor.
M:
number of mobiles in the cell.
Note that this assumption is not restrictive, since in a real system, the channel condition of a mobile is mapped into a level set with
a finite number of levels by using quantization.
5
In this equation, if Ni = 1, then the signal quality metric γs,i represents the signal to interference and noise ratio (SINR) for mobile i. If Ni is the processing gain for mobile i, which is defined by W/Ri , where W is the chip rate and Ri is the data rate, then γs,i represents the bit energy to interference density ratio of mobile i, (Eb /I0 )s,i in the CDMA system, and if Ni = W , then γs,i = (Eb /I0 )s,i Ri of mobile i in the CDMA system. The utility function Ui represents the degree of mobile i’s satisfaction to the received signal quality. It could, for example, represent the throughput, a function of throughput, and the cost of power, etc. We assume that the utility function, Ui , is an increasing and continuous function of γs,i , bounded above, and Ui (0) = 0. Remark 1: In some cases, the utility function could be a discrete function due to the discrete nature of the rate adaptation. However, in this case, the optimization problem is formulated as an integer optimization problem, which in general requires a much more complex algorithm than its continuous counterpart. Hence, it would be a more appropriate approach to solve the problem approximating the discrete function with the continuous function rather than to directly solve the integer optimization problem. Hence, in this paper, we assume that the utility function is continuous. Remark 2: In this paper, we assume that the base-station always has packets to transmit to all users, as in the most of the previous works [1], [2], [3], [4], [5], [6]. In general, the base-station is connected with the high speed Internet and the wireless link is could be a bottleneck link in the downlink communication. Hence, in most of the time, the base-station has packets to transmit to the users and our assumption could be a good approximation to it.
III. O PPORTUNISTIC P OWER S CHEDULING The goal of this paper is to obtain the power scheduling solution for each mobile such that the expected total system utility (i.e., the sum of the expected utilities of all mobiles) under appropriate performance or fairness constraints is maximized. In this section, we first study the problem with general constraints and, in the next section, we will further investigate some relevant special cases.
6
The opportunistic power scheduling problem is formulated as (P)
max s. t.
S X
πs
M X
Us,i (Ps,i )
s=1 i=1 S X
πs gs,i (P¯s ) ≥ Ki , i = 1, 2, · · · , M,
s=1
P¯s ∈ Xs ,
s = 1, 2, · · · , S,
P where P¯s = (Ps,1 , Ps,2 , · · · , Ps,M ), Xs = {(xs,1 , xs,2 , · · · , xs,M ) | M i=1 xs,i ≤ PT , 0 ≤ xs,i ≤ △
PT , i = 1, 2, · · · , M }, Us,i (Ps,i )= Ui (γs,i (Ps,i )), and πs is the probability that the system is in state s. It is clear that to maximize the total system utility, the base-station always has to transmit at its maximum transmission power limit, i.e.,
PM
i=1
Ps,i = PT [12], [13]. Hence, we can redefine γs,i (P¯s )
in (1) as △
γs,i (Ps,i )= In this problem,
PS
s=1
Ni Gs,i Ps,i . θGs,i (PT − Ps,i ) + Is,i
πs gs,i (P¯s ) ≥ Ki could either be a performance or fairness constraint for mobile
i. We assume that gs,i is bounded. Even though the utility of a mobile depends only on its own power scheduling (i.e., its own SINR), we allow the constraint on each mobile to depend not only on its own power scheduling but also on the power scheduling of the other mobiles. Remark 3: For simplicity, in this section, we assume that Us,i (Ps,i ) is a strictly concave function and gs,i (P¯s ) is a concave and continuous function. We will study the more general case in Section V. The power scheduling problem (P) is formulated as a stochastic optimization problem [14], [15]. We assume that there exists at least a feasible solution (i.e., the solution that satisfies the constraints) to the above problem. Note that if the problem has a relative performance or fairness constraint (such as the utility based fairness constraint or the resource based fairness constraint discussed in the next section), feasibility is always guaranteed. However, if the problem has an absolute constraint, such as the minimum performance constraint studied in the next section, in general, we cannot guarantee feasibility. In this case, feasibility can be achieved by adopting an appropriate admission control strategy. The development of such a strategy is outside the scope of this paper. Instead, in this paper, we assume that the system has an admission control policy in place that ensures feasibility and focus on the scheduling problem.
7
In problem (P), if we knew the underlying probability distribution for the state of the system (i.e., πs , ∀s), the problem could be equivalent to a deterministic convex optimization problem that can easily be solved. However, in practice, we do not have such a priori knowledge. Thus, we need to develop an algorithm that will work even without such a priori knowledge of the underlying probability distribution for the state of the system. To this end, we consider the dual of problem (P) and implement the power scheduling algorithm by using a stochastic subgradient algorithm. We define a Lagrangian function associated with problem (P) as S X
L(¯ µ, P¯ ) =
πs
s=1
M X
Us,i (Ps,i ) +
i=1
M X
µi (
i=1
S X
πs gs,i (P¯s ) − Ki ),
s=1
where P¯ = (P¯1 , P¯2 , · · · , P¯S ) and µ ¯ = (µ1 , µ2 , · · · , µM ). Then, the dual of problem (P) is defined as: (D)
min F (¯ µ) µ ¯ ≥¯ 0
where F (¯ µ) = max L(¯ µ, P¯ ) P¯ ∈X
(2)
and X = {(¯ x1 , x¯2 , · · · x¯S ) | x¯s ∈ Xs , s = 1, 2, · · · , S}. To solve problem (D), we first consider the problem in (2). For a given µ ¯, the problem is separable in s and, thus, P¯ (¯ µ) maximizes L(¯ µ, P¯ ) if and only if P¯ (¯ µ) = (P¯1 (¯ µ), P¯2 (¯ µ), · · · , P¯S (¯ µ)), where M X
P¯s (¯ µ) = arg max {
P¯s ∈Xs i=1
Us,i (Ps,i ) + µi gs,i (P¯s )}, s = 1, 2, · · · , S.
(3)
For a given µ ¯ and system state s, the problem in (3) is a deterministic convex optimization problem. Hence, we can easily solve it without knowledge of the underlying probability distribution. We now solve the dual problem (D). Note that F (¯ µ) is a convex function of µ ¯ and, thus, problem (D) is a stochastic convex optimization problem. Hence, we use a stochastic subgradient method [15], [16], which is defined by the following iterative process: (n+1)
µi
(n)
where [a]+ = max{0, a} and vi
(n)
= [µi
(n)
− α(n) vi ]+ , i = 1, 2, · · · , M,
(4)
is a random variable. Let the sequence of solutions, µ ¯(0) , µ ¯(1) , · · · , µ ¯(n) , (n)
(n)
(n)
be generated by (4) and v¯(n) = (v1 , v2 , · · · , vM ) be chosen such that E{¯ v (n) | µ ¯(0) , µ(1) , · · · , µ(n) } = ∂µ¯ F (¯ µ(n) ),
8
where ∂µ¯ F (¯ µ(n) ) is a subgradient of F (¯ µ) with respect to µ ¯ at µ ¯ = µ ¯(n) . Then, the vector v¯(n) is called a stochastic subgradient of F (¯ µ) with respect to µ ¯ at µ ¯=µ ¯(n) . In this case, by solving (4), µ ¯(n) converges to µ ¯o , the optimal solution of problem (D), with probability 1, if the following conditions are satisfied: E{||¯ v (n) ||2 | µ ¯(0) , µ(1) , · · · , µ(n) } ≤ c
(5)
for a constant c and α(n) ≥ 0,
∞ X
n=0
α(n) = ∞, and
∞ X
(α(n) )2 < ∞.
(6)
n=0
To apply the stochastic subgradient method to solve problem (D), we need to know a stochastic subgradient of F (¯ µ), ∂µ¯ F (¯ µ). By Danskin’s Theorem [17], ∂µ¯ F (¯ µ) is obtained by ∂µ¯ F (¯ µ) = (d1 , d2 , · · · , dM ),
(7)
where di =
S X
πs gs,i (P¯s (¯ µ)) − Ki , i = 1, 2, · · · , M,
s=1
and P¯s (¯ µ) = (Ps,1 (¯ µ), Ps,2 (¯ µ), · · · , Ps,M (¯ µ)) is a solution of the problem in (3). Hence, we can take (n)
vi
= gs(n) ,i (P¯s(n) (¯ µ(n) )) − Ki , i = 1, 2, · · · , M,
(8)
where s(n) is an index of the system state at iteration n. Then, since we assume that gs(n) ,i is bounded, the condition in (5) is satisfied and, thus, the algorithm in (4) converges to the optimal solution that solves problem (D) with a sequence of step-sizes that satisfies the conditions given in (6) such as α(n) = 1/n. Since the primal problem (problem (P)) is a convex optimization problem, there is no duality gap between it and its dual (problem (D)). Hence, the algorithm also converges to the optimal power scheduling. Note that our subgradient method does not require knowledge of the underlying probability distribution πs .
9
A. Problem with Separable Constraints In many cases (see examples in the next section), the performance or fairness constraint gs,i (P¯s ) for each user i can be separable, i.e., the constraint can be represented as gs,i (P¯s ) =
M X
j ai,j gs,i (Ps,j ), ∀i.
(9)
j=1
In this case, the problem in (3) can be rewritten by M X
P¯s (¯ µ) = arg max {
P¯s ∈Xs i=1
ad Us,i (¯ µ, Ps,i )},
(10)
M X
(11)
where ad Us,i (¯ µ, Ps,i )
= Us,i (Ps,i ) +
i µj aj,i gs,j (Ps,i ).
j=1 ad For a given µ ¯ and system state s, Us,i (¯ µ, Ps,i ) for user i can be represented as a function of its own ad power allocation, as in the original utility function. We call Us,i (¯ µ, Ps,i ) the adjusted utility function
of mobile i. Hence, in this case, by solving (10), we obtain a power allocation that maximizes the sum ad of the adjusted utilities, Us,i (¯ µ, Ps,i )’s, of all mobiles with a constraint only on the total transmission
power limit of the base-station.
B. Implementation To implement the opportunistic power scheduling scheme, each mobile needs to inform the basestation of its utility function when a call is initiated. In each time-slot, the base-station selects mobiles to be currently scheduled and determines the transmission power level for these mobiles in the following way. In time-slot n, each mobile measures its path gain and interference, and sends this information to the base-station. By using the measured data, the base-station can know the system state in the time-slot and calculate the power allocation vector in the time-slot P¯s∗(n) by solving the problem in (3) with µ ¯=µ ¯(n) and s = s(n) , where µ ¯(n) is obtained by (4) and s(n) is the system state in the time-slot. Since for a given µ ¯(n) and system state s(n) , the problem in (3) is a deterministic convex optimization problem, it can be easily solved by using standard convex optimization techniques such as Karush-Kuhn-Tucker (KKT) conditions and the duality theorem. Further, based on the power
10
allocation in the current time-slot, the value of µ ¯(n+1) for the next time-slot is updated by using a stochastic subgradient method in (4). If the constraint for each mobile is separable, as in the previous subsection, we can interpret the power scheduling procedure as follows. As shown in the previous subsection, by solving (10) in each time-slot, power is allocated to mobiles such that the sum of the adjusted utilities of the mobiles is maximized without considering the performance or fairness constraint of each mobile. In this case, the constraint on each mobile can be achieved by the appropriate adjusted utility function (i.e., by the appropriate µi ) for each mobile. IV. E XAMPLES In this section, we consider the following typical constraints that are important in providing adequate quality transmission to the mobiles. These are: the minimum performance constraint, the utility based fairness constraint, and the resource based fairness constraint. A. Minimum performance constraint In this power scheduling problem, each mobile i has a constraint on its minimum expected utility, Ci , which is formulated as S X
πs Us,i (Ps,i ) ≥ Ci , i = 1, 2, · · · , M.
s=1
Hence, Ki = Ci and gs,i (P¯s ) is separable and represented by (9) with 1,
ai,j =
if i = j
0, otherwise
Us,i (Ps,i ), if i = j
j and gs,i (Ps,j ) =
0,
.
otherwise
Therefore, from (11), the adjusted utility function for mobile i is obtained by multiplying a weight factor 1 + µi to the original utility function as ad Us,i (¯ µ, Ps,i ) = (1 + µi )Us,i (Ps,i ).
Further, from (8), the stochastic subgradient is obtained by the difference between the achieved utility of the user in the current time-slot and its constraint as (n)
vi
= Us(n) ,i (Ps(n) ,i (¯ µ(n) )) − Ci .
11
B. Utility Based Fairness Constraint In this subsection, we consider an opportunistic power scheduling problem in which each mobile i is guaranteed to achieve at least a fraction wi of the expected total system utility. This constraint is formulated as S X
πs Us,i (Ps,i ) − wi
s=1
where wi ≥ 0, and
PM
i=1
S X
πs
s=1
M X
Us,j (Ps,i ) ≥ 0,
j=1
wi ≤ 1. Hence, Ki = 0 and gs,i (P¯s ) is separable and represented by (9) with 1 − wi , if i = j
ai,j =
−wi ,
j and gs,i (Ps,j ) = Us,j (Ps,j ).
otherwise
Again, from (11), we obtain the adjusted utility function ad Us,i (¯ µ, Ps,i )
= (1 + µi −
M X
µj wj )Us,i (Ps,i ),
j=1
which is obtained by multiplying a weight factor 1 + µi −
PM
j=1
µj wj to the original utility function.
Further, from (8) the stochastic subgradient is obtained as (n)
vi
= Us(n) ,i (Ps(n) ,i (¯ µ(n) )) − wi
M X
Us(n) ,j (Ps(n) ,i (¯ µ(n) )),
j=1
which is the difference between the achieved utility of the user and its constraint based on power allocation in the current time-slot.
C. Resource Based Fairness Constraint Here, each mobile i is guaranteed to consume resource (power) by an amount that is at least hi fraction of the total amount of resource (i.e., hi fraction of the total transmission power), which is formulated by S X
πs Ps,i − hi
s=1
where hi ≥ 0 and
S X
πs
s=1
PM
i=1
M X
Ps,j =
j=1
S X
πs Ps,i − hi PT ≥ 0, i = 1, 2, · · · , M,
s=1
hi ≤ 1. Hence, Ki = 0 and gs,i (P¯s ) is separable and represented by (9) with 1 − hi ,
ai,j =
−hi ,
if i = j otherwise
j and gs,i (Ps,j ) = Ps,j .
12
From (8) and (11), the adjusted utility function for mobile is obtained as ad Us,i (¯ µ, Ps,i ) = Us,i (Ps,i ) + µi Ps,i ,
which is achieved by adding an offset value µi Ps,i to the original utility function and the stochastic subgradient is obtained as (n)
vi
= Ps(n) ,i (¯ µ(n) ) − hi PT ,
which is the difference between the amount of power that is allocated to the user in the current timeslot and its constraint. V. N ON - CONVEXITY AND C OMPLEXITY I SSUES Thus far, we have developed an opportunistic power scheduling algorithm under a convex optimization framework, i.e., we have assumed that Us,i is a strictly concave function and gs,i (P¯s ) is a concave function. This allows us to use a dual approach to obtain the optimal power scheduling solution, since there is no duality gap between the primal and its dual. In this section, we will weaken this assumption to reflect the fact that utility functions of interest may not be concave, but in fact sigmoidal [12], [13]. In this case, the problem could be a non-convex optimization and there might be a duality gap between the primal problem and its dual. Hence, the dual approach may not result in an optimal solution to the primal problem. However, as we show in the next proposition, as the randomness in the system increases, the duality gap decreases. Hence, as the randomness of the system increases (i.e., as we have a finer granularity of the quantization for the channel condition of each mobile), we can achieve a better approximation of the optimal power scheduling by solving the dual problem. Proposition 1: Let sup(P ) be the optimal value of problem (P) and inf(D) be the optimal value of the corresponding dual problem. If sups πs
PM
i=1
Us,i (Ps,i ) → 0 and sups πs gs,i (P¯s ) → 0 as S → ∞,
then sup(P ) − inf(D) → 0 as S → ∞. Proof: See Appendix. From this result, we deduce that when the randomness of the system is large, the same power scheduling algorithm that has been developed in this paper can be used to obtain a good approximation to the
13
optimal solution. Note that the main complexity of our algorithm comes from that we must solve the optimization problem in (3), (or the problem in (10), if constraints are separable) in each time-slot. If the problem is convex, then it can be solved by using simple standard algorithms such as a gradient projection algorithm and a penalty approach. However, when we have non-concave utility functions, it is a nonconvex optimization problem, which is in general difficult to solve. In our previous work [12], [13], we have developed a power allocation algorithm by considering a similar problem to the problem in (10) with three types of utility functions: concave, convex, and sigmoidal-like functions. This algorithm provides asymptotically (in the number of mobiles) optimal power allocation that is shown to be a good approximation of the optimal power allocation even with the moderate number of mobiles. Hence, if the constraint for each user is separable and the adjusted utility function of each user is represented by one of those three types of functions (this condition is satisfied for each power scheduling in the previous section if the utility function of each user is represented by one of those three types of functions), we can obtain a good approximation of the optimal solution of the problem in (10) by using the algorithm that we previously developed in [12], [13]. The algorithm consists of two stages: the mobile selection stage where the base-station selects mobiles and the power allocation stage where the base-station allocates power to the selected mobiles. The complexity of the mobile selection stage is O(M ) and at the power allocation stage, the problem is reduced to a simple convex optimization problem. Hence, our algorithm can be easily implemented.
VI. N UMERICAL R ESULTS In this section, we provide numerical results to illustrate various features of our power scheduling scheme. We consider a CDMA system that consists of nine square cells, as in Fig. 1. We assume that the base-station is located at the center of the cell and each base-station always transmits at its maximum transmission power limit, PT . We focus on the center cell of the system. We model the path gain from the base-station to mobile i, Gs,i , as Gs,i =
Ds,i , tαi
(12)
14
where ti is the distance from the base-station to mobile i, α is a distance loss exponent, and Ds,i is a log-normally distributed random variable with mean 0 and variance σ 2 (dB), which represents shadowing [18]. We let PT = 10, α = 4, θ = 1, and the length of the side of the cell be 1000. We assume that mobile i has a sigmoidal utility function that is non-concave and is expressed by Ui (γi ) = ci { where we set ci =
1+eai bi eai bi
and di =
1 1+eai bi
1 1+
eai (γi −bi )
− di },
for normalization (i.e., U (0) = 0 and U (∞) = 1). For each
experiment, we run the simulation program for 104 time-slots and provide µ ¯(n) in the last time-slot, 4
i.e., µ ¯(10 ) and the (time) average value of the utility for each mobile i, Uia and the average value of the total system utility, UTa , which are defined as Uia (n)
where Ui
104 1 X (n) Ui , = 4 10 n=1
is the achieved utility of mobile i in time-slot n, and UTa
M X 104 1 X (n) = 4 Ui , 10 i=1 n=1
where M is the number of mobiles. In the first experiment, we simulate our opportunistic power scheduling scheme with minimum performance constraints. We assume that there are five mobiles with the same utility function. We set ai = 1, bi = 7, Ni = 32, and Ci = 0.503 for all mobiles, and σ = 4 dB. We assume that mobile i has a fixed distance ti = 100 × i from the base-station. Hence, mobile 1 is closest and mobile 5 is farthest from the base-station. This implies that, in general, mobile i has a better channel condition than mobile j, if i < j. We also compare the performance of our opportunistic power scheduling scheme with those of two other schemes. In the non-opportunistic power scheduling scheme, in each time-slot, power is allocated to each mobile so that they achieve the same utility (however, the power allocation is done such that this is the maximum possible utility value). Hence, in this scheme, the time-varying channel condition of each mobile is not exploited. In the greedy power scheduling scheme, in each time-slot, power is allocated to each mobile so that the system utility of the timeslot can be maximized. This can be achieved by solving the problem in (10) with the original utility
15
function for each mobile (i.e., µi = 0, ∀i) in each time-slot. Hence, in this scheme, the minimum performance constraint of each mobile is not considered. We provide the average utility of each mobile and the average total system utility for each power scheduling scheme in Table I. As this table shows, in the non-opportunistic scheduling scheme, each mobile achieves the same average utility. However, since it does not exploit the time-varying channel condition of each user, it results in the lowest average total system utility. The greedy scheduling scheme provides the highest average total system utility, but it does not satisfy the minimum performance constraint for some mobiles (e.g., it violates the minimum performance constraint for mobile 5). Compared with the other two schemes, our opportunistic power scheduling scheme satisfies the minimum performance constraint of each mobile without a significant loss of efficiency. In Table II, we also provide the value of µi for each mobile i in time-slot 104 . The table shows that µ1 , µ2 , and µ3 converge to zero, as these correspond to the µi values of mobiles 1, 2, and 3, all of which more than satisfy their minimum performance constraints. However, µ4 and µ5 are strictly positive as their corresponding mobiles just barely satisfy their minimum performance constraints. The reason for this result can be explained as follows. As shown in the previous section, our algorithm is equivalent to solving the problem in (10) in each time-slot that attempts to maximize the weighted sum of all mobiles’ utilities without minimum performance constraints. The constraints are satisfied with an appropriate weight factor for each mobile. In this experiment, if each mobile has a unit weight factor (i.e., µi = 0, ∀i), the minimum performance constraint of mobile 5 cannot be satisfied (see greedy scheduling in Table I). Hence, to satisfy the minimum performance constraint of mobile 5, the weight factor of mobile 5 (i.e., µ5 ) must be increased. By increasing the weight factor, more power can be scheduled to mobile 5, thus improving its performance. Further, since this violates the minimum performance constraint of mobile 4, the weight factor of mobile 4 (i.e., µ4 ) is also increased. In this case, since mobile 5 experiences a worse channel condition than mobile 4, mobile 5 needs a larger weight factor (i.e., a larger value of µi ) than that of mobile 4 to meet its performance constraint. However, for system efficiency, the weight factors of mobiles 4 and 5 must be increased up to the values with which their minimum performance constraints are barely satisfied. On the other
16
hand, the weight factors for the other mobiles that satisfy their minimum performance constraints with strict inequality are not increased, since their minimum performance constraints can be satisfied even without increasing their weight factors. In the second experiment, we simulate our opportunistic power scheduling scheme with utility based fairness constraints considering the same system, as in the previous experiment. We provide the results for wi = 0.2 and wi = 0.1 for each mobile, respectively. We also compare the performance of our opportunistic power scheduling scheme with those of greedy and non-opportunistic scheduling schemes. Note that when wi = 0.2, each mobile must achieve the same average utility and, thus, both our opportunistic power scheduling scheme and the non-opportunistic power scheduling scheme have the same fairness constraint. We provide the average utility of each mobile and the average total system utility for each scheme in Table III and µi of each mobile i in the last time-slot for our opportunistic power scheduling scheme in Table IV. As the results show, the greedy power scheduling scheme does not satisfy the constraint for some mobiles while it provides the highest average total system utility. When wi = 0.2 for each mobile, both our opportunistic power scheduling and non-opportunistic power scheduling satisfy the constraint of each mobile. However, since our opportunistic power scheduling scheme exploits the variations of the channel condition, it provides a higher average utility to each individual mobile and, thus, a higher average total system utility than the non-opportunistic power scheduling scheme. In our opportunistic power scheduling, the system with wi = 0.1 has a looser fairness constraint than the system with wi = 0.2. Hence, the former has more freedom to use power to increase the efficiency of the system than the latter, which results in the increase in the average total system utility. Table IV shows that, as in the previous experiment, only mobiles that barely satisfy their fairness constraints have a positive µi and to meet its constraint the mobile with a worse channel condition has a higher weight factor than the mobile with a better channel condition. In the third experiment, we simulate our opportunistic scheduling scheme with resource based fairness constraints. In this simulation, we assume that each mobile has a different utility function but the same distance from the base-station. We set Ni = 32, ai = 1, and bi = 5 + i for mobile i. In this
17
case, in general, a mobile with a larger value of bi requires more power to achieve the same utility than a mobile with a smaller value of bi . Hence, we can infer that mobile i is more efficient than mobile j, if i < j. We provide the results for hi = 0.2 and hi = 0.15 for each mobile, respectively. Note that when hi = 0.2, each mobile must be allocated the same amount of power on average. We also compare the performance of our opportunistic power scheduling scheme with those of greedy and non-opportunistic scheduling schemes. In the non-opportunistic scheduling scheme, each mobile is allocated a power of PT /M in each time-slot. Hence, it has the same fairness constraint as our opportunistic power scheduling scheme with hi = 0.2. We provide the average utility of each mobile and the average total system utility for each scheme in Table V and the average allocated power level, Pia , for each mobile i in Table VI, which is defined as Pia (n)
where Pi
104 1 X (n) = 4 P , 10 n=1 i
is the allocated power to mobile i in time-slot n. We also provide µ ¯(10
4)
in Table VII.
These tables show similar results to those of previous experiments. In Fig. 2, we compare the performance of our opportunistic power scheduling and that of nonopportunistic power scheduling by varying the standard deviation σ of Ds,i in (12) for each constraint. A larger value of σ implies a larger fluctuation of the path gain between the mobile and the base-station. For the simulation with minimum performance constraints, we first simulate the non-opportunistic power scheduling and use the achieved utility of each mobile in this scheduling as the minimum performance constraint. For utility and resource based fairness constraints, we set bi = 0.2 and hi = 0.2, respectively. Hence, for each setup, our opportunistic power scheduling and non-opportunistic power scheduling have the same constraint. The results show that as σ increases, the performance gain of our opportunistic power scheduling schemes over non-opportunistic schemes increases. This implies that a larger fluctuation in the path gain results in a larger advantage to our opportunistic power scheduling scheme, providing a greater freedom to exploit the time-varying channel condition associated with each mobile. Note that in the above experiments, the utility function of each mobile is normalized such that its maximum value is set be one. Hence, in “single-server” scheduling schemes that have been developed
18
in [1], [2], [3], [4], the average total system utility for each constraint can be at most one, which is much lower than that of our “multi-server” scheduling scheme. To further illustrate the advantage of our “multi-server” scheduling scheme over a “single-server” scheduling scheme, we compare their performance in Tables VIII and IX. Here, both system have the same system parameters such as the same bandwidth, the same cell size, and so on. In these tables, we simulate each opportunistic scheduling scheme with utility based fairness constraints by varying the distance of the mobiles from the base-station. We generate five mobiles and set ai = 0.5, bi = 11, Ni = 32, and wi = 0.2 for all mobile i. Each mobile is located at the same distance t from the base-station. As the distance t gets larger, the channel condition of each mobile gets worse. We compare the average number of selected mobiles in a time-slot (S a ) of each scheme, which is defined as 104 1 X S = 4 S (n) , 10 n=1 a
where S (n) is the number of selected mobiles for transmission in time-slot n in Table VIII, and the average total system utility of each scheme in Table IX. The results indicate that our “multi-server” scheduling scheme can adapt to various system environment by controlling the number of selected mobiles for simultaneous transmission in a time-slot. As the channel condition of each mobile gets better, our scheme selects more mobiles for simultaneous transmission in a time-slot and, thus, provides higher system efficiency than the “single-server” scheduling scheme.
VII. C ONCLUSION In this paper, we have developed an opportunistic power scheduling scheme in “multi-server” systems with general constraints on fairness or performance. This scheme exploits the time-varying channel condition of each mobile and determines, in each time-slot, which and how many mobiles should be scheduled for transmission and at what power level. We have formulated the problem as a stochastic optimization problem. But the main difficulty in solving this problem is that, in practice, we do not have a priory knowledge of the time-varying channel conditions of mobiles. Hence, in this paper, we have solved the problem by using stochastic duality and a stochastic subgradient method, and implemented the power scheduling algorithm that does not require such a priori knowledge.
19
The results show that our opportunistic power scheduling scheme is more efficient than nonopportunistic power scheduling that does not exploit the time-varying channel condition of each mobile. Moreover, compared with a “single-server” scheduling scheme, our “multi-server” scheduling scheme provides higher system efficiency by controlling the number of simultaneously scheduled mobiles in a time-slot by adapting to the system environment. The results also show that as the variation of channel condition gets larger, the relative efficiency of our opportunistic power scheduling over non-opportunistic power scheduling increases. While our solution always achieves optimality for concave utility functions, we have shown that even for non-concave utility functions, as the variation of channel condition gets larger, our power scheduling can provide a better approximation to the optimal power scheduling. Therefore, the time-varying channel condition of the mobile could be beneficial to efficient and fair power scheduling, if it is appropriately exploited.
A PPENDIX P ROOF OF P ROPOSITION 1 P ¯ ¯ ¯ ¯ Let fs (P¯s ) = πs M i=1 Us,i (Ps,i ), hs (Ps ) = πs (gs,1 (Ps ), gs,2 (Ps ), · · · , gs,M (Ps )), and b = (K1 , K2 , · · · , KM ).
Then, we can rewrite problem (P) as: max
S X
fs (P¯s )
s=1
subject to P¯s ∈ Xs , PS
s=1
s = 1, 2, · · · , S
hs (P¯s ) ≥ b
The above is the same primal problem in Proposition 5.26 in [19] and we will prove this proposition in a similar way to the proof of Proposition 5.26 in [19]. We can easily show that the assumptions (A1) and (A2) of Proposition 5.26 in [19] are satisfied, i.e., there exists at least one feasible solution, Xs is compact, and fs and hs are continuous on Xs . However, note that the assumption (A3) of Proposition 5.26 in [19] may not be satisfied. Hence, the proof of Proposition 5.26 in [19] is not directly applicable for the proof of this proposition. Since the assumptions (A1) and (A2) of Proposition 5.26 in [19] are satisfied, from the proof of
20
Proposition 5.26 in [19], there exist vectors P¯sj ∈ Xs , P¯s∗ and scalars αs1 , αs2 , · · · , αsM +2 such that M +2 X
αsj = 1, αsj ≥ 0, j = 1, 2, · · · , M + 2,
j=1
X
hs (P¯s∗ ) +
s6∈S¯
M +2 X
αsj hs (P¯sj ) ≥ b,
j=1
and X
fs (P¯s∗ ) +
s6∈S¯
M +2 X
αsj fs (P¯sj ) = inf(D),
j=1
where S¯ is a subset of {1, 2, · · · , S} with at most M + 1 indices. By the definitions of hs and fs , and the assumption that sups πs
PM
i=1
Us,i (Ps,i ) → 0 and sups πs gs,i (P¯s ) → 0, as S → ∞,
S X
hs (P¯s∗ ) =
S X
fs (P¯s∗ ) =
X
hs (P¯s∗ ) +
X
fs (P¯s∗ ) +
s6∈S¯
s=1 M +2 X
hs (P¯s∗ ) →
X
fs (P¯s∗ ) →
s6∈S¯
αsj hs (P¯sj ) → 0, and
j=1
X
hs (P¯s∗ ),
X
fs (P¯s∗ ),
s6∈S¯
s6∈S¯
s6∈S¯
s=1
X
s6∈S¯
M +2 X
αsj fs (P¯sj ) → 0,
j=1
as S → ∞. Hence, S X
hs (P¯s∗ ) ≥ b − ǫ, ||ǫ|| → 0 and
s=1
S X
fs (P¯s∗ ) → inf(D),
s=1
as S → ∞. Further, by the weak duality theorem, sup(P ) ≤ inf(D). Hence, sup(P ) − inf(D) → 0, as S → ∞.
R EFERENCES [1] X. Liu, E. K. P. Chong, and N. B. Shroff, “Opportunistic transmission scheduling with resource sharing constraints in wireless networks,” IEEE Journal of Selected Areas in Communications, vol. 19, no. 10, pp. 2053–2065, Oct. 2001. [2] X. Liu, “Opportunistic scheduling in wireless communication networks,” Ph.D. dissertation, Purdue University, 2002. [3] X. Liu, E. K. P. Chong, and N. B. Shroff, “A framework for opportunistic scheduling in wireless networks,” Computer Networks, vol. 41, no. 4, pp. 451–474, Mar. 2003.
21
[4] S. Borst and P. Whiting, “Dynamic rate control algorithms for HDR throughput optimization,” in IEEE Infocom’01, vol. 2, 2001, pp. 976–985. [5] S. S. Kulkarni and C. Rosenberg, “Opportunistic scheduling for wireless systems with multiple interfaces and multiple constraints,” in ACM International Workshop on Modeling, Analysis, and Simulation of Wireless and Mobile Systems, 2003. [6] Y. Liu and E. Knightly, “Opportunistic fair scheduling over multiple wireless channels,” in IEEE Infocom’03, vol. 2, 2003, pp. 1106–1115. [7] Y. Cao and V. O. K. Li, “Scheduling algorithms in broad-band wireless networks,” Proceedings of the IEEE, vol. 89, no. 1, pp. 76–87, Jan. 2001. [8] H. Fattah and C. Leung, “An overview of scheduling algorithms in wireless multimedia networks,” IEEE Wireless Communications, vol. 9, no. 5, pp. 76–83, Oct. 2002. [9] R. Prasad and T. Ojanpera, “An overview of CDMA evolution toward wideband CDMA,” IEEE Communications Surveys & Tutorials, vol. 1, pp. 2–29, 4th Quarter 1998. [10] J.-W. Lee, R. R. Mazumdar, and N. B. Shroff, “Joint power and data rate allocation for the downlink in multi-class CDMA wireless networks,” in 40th Annual Allerton Conference on Communications, Control, and Computing, 2002. [11] ——. (2003) Joint resource allocation and base station assignment for the downlink in CDMA netwroks. Submitted for publication. [Online]. Available: http://www.princeton.edu/∼janglee/Documents/prba.pdf [12] ——, “Downlink power allocation for multi-class CDMA wireless networks,” in IEEE Infocom’02, vol. 3, 2002, pp. 1480–1489. [13] ——. (2002) Downlink power allocation for multi-class wireless systems. To appear in IEEE/ACM Transactions on Networking, 2005. [Online]. Available: http://www.princeton.edu/∼janglee/Documents/power control.pdf [14] R. T. Rockafellar and R. J.-B. Wets, “Stochastic convex programming: basic duality,” Pacific Journal of Mathematics, vol. 62, no. 1, pp. 173–195, 1976. [15] P. Kall and S. W. Wallace, Stochastic programming.
Wiley, 1994.
[16] Y. Ermoliev, “Stochastic quasigradient methods and their application to system optimization,” Stochastics, vol. 9, pp. 1–36, 1983. [17] D. P. Bertsekas, Nonlinear programming.
Athena Scientific, 1999.
[18] G. Stuber, Principles of Mobile Communication.
Kluwer Academic Publishers, 1996.
[19] D. P. Bertsekas, Constrained Optimization and Lagrange Multiplier Methods. Academic Press, 1982.
22
BS
BS
BS
BS
BS
BS
BS
BS
BS
Fig. 1. Cellular network model.
Ratio of average total system utilities
4 Minimum perfromance Utility based fairness Resource based fairness
3.5
3
2.5
2
1.5
1 1
2
3
4
5
σ
6
7
8
9
10
Fig. 2. The ratio of the total system utility of opportunistic power scheduling to that of non-opportunistic power scheduling.
TABLE I C OMPARISON OF AVERAGE U TILITIES ( WITH M INIMUM P ERFORMANCE C ONSTRAINTS ).
Mobile
1
2
3
4
5
Total
Non-opportunistic
0.503
0.503
0.503
0.503
0.503
2.515
Our opportunistic
0.975
0.963
0.805
0.502
0.505
3.750
Greedy
0.985
0.984
0.958
0.738
0.185
3.850
TABLE II C OMPARISON OF µi
FOR
E ACH M OBILE ( WITH M INIMUM P ERFORMANCE C ONSTRAINTS ).
Mobile
1
2 3
4
5
µi
0
0 0
0.080
1.097
23
TABLE III C OMPARISON OF AVERAGE U TILITIES ( WITH U TILITY BASED FAIRNESS C ONSTRAINTS ).
Mobile
1
2
3
4
5
Total
Non-opportunistic
0.503
0.503
0.503
0.503
0.503
2.515
Our opportunistic (wi = 0.2)
0.694
0.694
0.692
0.694
0.695
3.469
Our opportunistic (wi = 0.1)
0.982
0.979
0.913
0.564
0.384
3.822
Greedy
0.985
0.984
0.958
0.738
0.185
3.850
TABLE IV C OMPARISON OF µi
FOR
E ACH M OBILE ( WITH U TILITY BASED FAIRNESS C ONSTRAINTS ).
Mobile
1
2
3
4
5
µi (wi = 0.2)
0.408
0.416
0.466
0.738
1.989
µi (wi = 0.1)
0
0
0
0
0.471
TABLE V C OMPARISON OF AVERAGE U TILITIES ( WITH R ESOURCE BASED FAIRNESS C ONSTRAINTS ).
Mobile
1
2
3
4
5
Total
Non-opportunistic fair
0.847
0.716
0.515
0.305
0.146
2.529
Our opportunistic (hi = 0.2)
0.854
0.787
0.719
0.647
0.596
3.603
Our opportunistic (hi = 0.15)
0.903
0.868
0.794
0.602
0.467
3.634
Greedy
0.916
0.887
0.835
0.705
0.304
3.647
24
TABLE VI C OMPARISON OF AVERAGE P OWER U SAGES ( WITH R ESOURCE BASED FAIRNESS C ONSTRAINTS ).
Mobile
1
2
3
4
5
Total
Non-opportunistic
2
2
2
2
2
10
Our opportunistic (hi = 0.2)
2.002
2.008
1.994
2.001
1.993
10
Our opportunistic (hi = 0.15)
2.207
2.280
2.220
1.785
1.508
10
Greedy
2.264
2.353
2.355
2.082
0.946
10
TABLE VII C OMPARISON µi
FOR
E ACH M OBILE ( WITH R ESOURCE BASED FAIRNESS C ONSTRAINTS ).
Mobile
1
2
3
4
5
µi (hi = 0.2)
4.785
4.802
4.813
4.831
4.852
µi (hi = 0.15)
0
0
0
0
0.019
TABLE VIII C OMPARISON OF AVERAGE N UMBERS OF S ELECTED M OBILES AT A T IME - SLOT.
t
100
200
300
400
500
Multi-server
3
2.576
2
1.982
1.396
Single-server
1
1
1
1
1
TABLE IX C OMPARISON OF AVERAGE T OTAL S YSTEM U TILITIES .
t
100
200
300
400
500
Multi-server
2.769
2.435
2
1.974
1.375
Single-server
1
1
1
1
0.998